Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption

07/13/2020
by   Willy Susilo, et al.
0

Puncturable encryption (PE), proposed by Green and Miers at IEEE S P 2015, is a kind of public key encryption that allows recipients to revoke individual messages by repeatedly updating decryption keys without communicating with senders. PE is an essential tool for constructing many interesting applications, such as asynchronous messaging systems, forward-secret zero round-trip time protocols, public-key watermarking schemes and forward-secret proxy re-encryptions. This paper revisits PEs from the observation that the puncturing property can be implemented as efficiently computable functions. From this view, we propose a generic PE construction from the fully key-homomorphic encryption, augmented with a key delegation mechanism (DFKHE) from Boneh et al. at Eurocrypt 2014. We show that our PE construction enjoys the selective security under chosen plaintext attacks (that can be converted into the adaptive security with some efficiency loss) from that of DFKHE in the standard model. Basing on the framework, we obtain the first post-quantum secure PE instantiation that is based on the learning with errors problem, selective secure under chosen plaintext attacks (CPA) in the standard model. We also discuss about the ability of modification our framework to support the unbounded number of ciphertext tags inspired from the work of Brakerski and Vaikuntanathan at CRYPTO 2016.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/04/2023

Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions

We construct quantum public-key encryption from one-way functions. In ou...
research
08/29/2018

On non-adaptive quantum chosen-ciphertext attacks and Learning with Errors

Large-scale quantum computing is a significant threat to classical publi...
research
05/07/2020

Lattice-based public key encryption with equality test in standard model, revisited

Public key encryption with equality test (PKEET) allows testing whether ...
research
02/18/2020

Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution

Attribute-based Encryption (ABE) is an information centric security solu...
research
08/23/2019

Bi-Homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption

We define a pseudorandom function (PRF) F: K×X→Y to be bi-homomorphic wh...
research
05/14/2020

Lattice-based Unidirectional IBPRE Secure in Standard Model

Proxy re-encryption (PRE) securely enables the re-encryption of cipherte...
research
05/25/2023

Composing Bridges

The present work builds on previous investigations of the authors (and t...

Please sign up or login with your details

Forgot password? Click here to reset